Thursday, April 10, 2025
HomeMalwareHackers Steals Facebook Account Details Using Android Malware

Hackers Steals Facebook Account Details Using Android Malware

Published on

SIEM as a Service

Follow Us on Google News

New Android malware discovered that steals Facebook credentials, account details such as username and Passwords and other information directly from users devices.

This Malware mainly targeting the Asian Pacific-based English speaking users and it spreading via the third-party market.

This new credential stealer contains a lot of aggressive function and malware author using new sophisticated functionality to compromise the victim’s device and steal the credentials.

- Advertisement - Google News

Also Read: A Facebook Vulnerability that Allows to Reveals the Facebook Page Admin Identity

How does this Malware steal Facebook Details

Once this Malware infects the victims initially it hide from the home screen and silently running in the background.

It will check the infected devices Facebook account by submitting the infected mobiles IMEI number to the attacker via command and control server.

If the malware did not collect any details regards the infected device Facebook account, it will very the apps list whether or not Facebook app installed.

Once it did not find the app then the malware launch the fake Facebook interface to compromise the victims and steal the victim’s original username and password.

This malware keeps display this interface until it successfully collects the Facebook credentials by using the JavaScript from a hidden WebView, the threat silently logs into the compromised Facebook account.

In this case, it also checks whether CAPTCHA is presented or not. if yes then it sends the event to the C&C server, clears caches and cookies, and retries later.

According to Symantec, Once the malware is logged into the Facebook page, it can leverage a wide range of capabilities to follow links and scrape the personal data of the victim and their friends, sending it back to the C&C server. This includes:
General top-level data: Facebook account, user, password, device IMEI
Profile: Work, education, location, contacts, basic info, nicknames, relationships, family, bio
Activities: Check in, events, friends, groups, likes, pages, posts

This malware using the functionality that crawls the Facebook page has a surprising level of sophistication. and the crawler has an ability to crawl the search and collect the Facebook search.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks

The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has...

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers,...

The State of AI Malware and Defenses Against It

AI has recently been added to the list of things that keep cybersecurity leaders...

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed

A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks

The threat actor known as GOFFEE has launched a series of targeted attacks against...

Sapphire Werewolf Upgrades Arsenal With Amethyst Stealer Targeting Energy Firms

Sapphire Werewolf has introduced a potent new weapon into its cyber arsenal, unveiling the...

Malicious ‘mParivahan’ App Circulates on WhatsApp, Skimming Sensitive Mobile Data

A new variant of the fake NextGen mParivahan app has emerged, exploiting the trust...